aso

Results 1151 - 1175 of 1186Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 29, 2009
Every minute counts in a small company and wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can roam where they need to and have constant access to the tools required to do their jobs.
Tags : 
cisco, wireless, wireless networks, information sharing, untethered access, wlan, wireless lan, effective communication, improved responsiveness, mobility, mobile computing, mobile data systems, mobile workers
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security, networking, security, anti virus, email security, encryption, firewalls
    
Cisco
Published By: Genesys     Published Date: Jan 27, 2009
In this document, Opus Research offers seven ways SIP (Session Initiation Protocol) can revolutionize customer care in your enterprise. More specifically, we evaluate deployments that involve SIP and provide case studies that integrate Genesys SIP the Customer Interaction Manager (CIM), Genesys Voice Platform (GVP), and Business Process Routing from Genesys Telecommunications Laboratories.
Tags : 
genesys, sip, session initiation protocol, customer integration manager, genesys voice platform, voip, crm, enterprise applications, customer interaction service, customer relationship management, customer satisfaction, video conferencing, voice recognition, voice over ip
    
Genesys
Published By: Dell Windows Server     Published Date: Jan 16, 2009
New virtualization tools, Web technologies, and security enhancements help save time and reduce costs, and provide you with high availability and increased flexibility for your changing business needs. Central to IT simplification is streamlining maintenance and maximizing availability — and by running Windows Server 2008 on Dell servers, you can do both.
Tags : 
dell, ws08, new virtualization, web technologies, security enhancements, windows server 2008, security, platforms, security management, windows, windows server
    
Dell Windows Server
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, anti spam, anti virus, application security, policy based management
    
Trend Micro SaaS
Published By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : 
godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation, b-to-b brand, b-to-b brand positioning, brand positioning, brand affinity, brand advertising, brand communications, branding research, b-to-b marketer, b-to-b buying process, b-to-b branding program, integration
    
Godfrey
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
    
Marketo, INC.
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf, networking
    
Tail-f Systems
Published By: NewField IT     Published Date: Aug 19, 2008
There has been an increased interest in companies adopting Managed Print Services to improve efficiency and reduce costs. Industry analysts have produced substantial amounts of material on the benefits and reasons why one should go down this road... but have they been listening to vendors too much?
Tags : 
knowledge management, document management
    
NewField IT
Published By: HighRoads     Published Date: Jul 29, 2008
How bad has the impact of the high costs of benefits become? For the past five years, the cost of healthcare rose at double-digit rates, greater than the growth of wages or inflation. The high cost of employee benefits is one of the primary reasons preventing leading companies from achieving their financial objectives.
Tags : 
workforce, highroads, benefits, employee, employees, human resources, hcm, human capital, human capital management, enterprise software, workforce management, incentive compensation
    
HighRoads
Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift, anti spam, email security, internet security, best practices
    
Clearswift
Published By: IBM     Published Date: May 30, 2008
People drive your business. Whether you are a customer, supplier, owner, or employee, it is cultivating and maintaining those people relationships within and beyond your company that determine how well you will fare in the marketplace. This is why IBM knows that it is important that you have ultimate choice and flexibility to work the way you want.
Tags : 
ibm, ep campaign, ibm ep, collaboration, relationship management, information management, desktop management, lotus notes, lotus, knowledge management
    
IBM
Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm, backup and recovery, business continuity, as/400, data protection
    
Vision Solutions
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by DM News in June 2006, begins, “As sure as the spring is followed by summer and succeeded by fall, online marketing options, Search, Lead Generation and Email, seem to enjoy a cyclic season in vogue.” This article describes how for many, the use of email cost effectively has driven sales and built brand awareness; however, for the majority, email has not delivered on the promise.
Tags : 
acquireweb, search, online marketing, lead generation, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines, vpn, access control, auditing, authentication
    
Identity Engines
Published By: Safe Software     Published Date: Mar 19, 2008
In this follow-up to their preholiday study of 12 of the season's most talked about products and retailers, Oneupweb looks at how these companies' online social media marketing strategies played out during the 2007 holidays. See what worked, why, and what social media marketing tactics you should be considering in 2008.
Tags : 
social, social media, one up web, oneupweb, survey, poll, ipod, wii, target, coach, webkinz, myspace, taryn, pronto, starbucks, pleo
    
Safe Software
Published By: iPerceptions     Published Date: Mar 18, 2008
A response to Chapter 5 (Why Satisfaction Surveys Fail), of Fred Reicheld's "The Ultimate Question", this white paper clearly illustrates the importance of tuning into the voice of the customer.
Tags : 
survey, surveys, poll, polls, polling, customer, iperceptions
    
iPerceptions
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt, knowledge management, storage management, records management, sarbanes oxley compliance
    
Sunbelt Software
Published By: Ultraseek     Published Date: Mar 07, 2008
The value of effective site and intranet search is clear. Finding the most relevant document helps your organization identify and capitalize on opportunities, accelerate business cycles, and implement and execute effective strategies. But whether you have a few thousand pages on your public website or a few million documents scattered across the globe, selecting the right search solution for your enterprise can challenge even the most seasoned technology buyer.
Tags : 
ultraseek, search, corporate portals, document management, intranets, search and retrieval
    
Ultraseek
Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics, compliance, security management, risk management
    
Intellitactics
Published By: Atlas Business Solutions     Published Date: Feb 27, 2008
Whether you are a seasoned Human Resource professional, or the owner or manager of a small business, understanding the intricacies involved in organizing the Human Resource functions is absolutely essential to running an efficient and legally compliant company. In this whitepaper, you’ll learn about the four main types of HR documents every manager can’t live without.
Tags : 
personnel, workforce, human resources, workforce management, document management, atlas business solutions, atlas, abs, business management
    
Atlas Business Solutions
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications, business integration, data integration
    
Cast Iron Systems
Published By: Motorola     Published Date: Feb 06, 2008
The mortgage banking business is ultra-competitive and rapidly changing. To compete in this environment requires a highly productive workforce with dependable, reliable and flexible communications so that employees can provide the best customer service possible. Read this case study to learn how George Mason Mortgage found a more robust and easy-to-manage mobility solution that helped the company accomplish its goals.
Tags : 
motorola, case study, motorola good, wireless communications, customer service, productivity
    
Motorola
Published By: SAP     Published Date: Feb 05, 2008
Many CEOs have told us that business transformation needs to be done effectively and efficiently, without much disruption to the business. And it should be a continuous process, not a one-time event. Continuous business transformation, accomplished over time, requires a new degree of flexibility and adaptability in all parts of the enterprise. So how do you get ready to change and continue to change?
Tags : 
sap, business transformation, enterprise applications, market leadership, application integration, best practices, business management
    
SAP
Published By: Vendor Guru     Published Date: Jan 04, 2008
Profound developments in business telephony have left some small businesses reeling under perceptions of a steep learning curve for expensive new products. But there’s no reason to be left behind. Affordability is the hallmark of the new generation in business telephony, thanks to hosted IP and other networked solutions. Is your business applying the new technology to best advantage?
Tags : 
ip pbx, pbx, acd, predictive dialing, automatic call distribution, voicemail, business communications, voice mail, conference call, telephony, ip telephony, voip, voice over ip, call routing, call routing, voip, vendorguru, vendor guru, vendorguru telephony, vendor guru telephony
    
Vendor Guru
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.